Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2002-1337
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.722Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2003:073", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "20030301-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "name": "IY40501", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "name": "20030303 Fwd: APPLE-SA-2003-03-03 sendmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "name": "RHSA-2003:227", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "name": "6991", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6991" }, { "name": "VU#398025", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/398025" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sendmail.org/8.12.8.html" }, { "name": "DSA-257", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-257" }, { "name": "20030304 [LSD] Technical analysis of the remote sendmail vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2222", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" }, { "name": "RHSA-2003:074", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "name": "CA-2003-07", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "name": "20030303 sendmail 8.12.8 available", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "name": "MDKSA-2003:028", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "name": "IY40500", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "name": "sendmail-header-processing-bo(10748)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10748.php" }, { "name": "CSSA-2003-SCO.6", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "name": "CSSA-2003-SCO.5", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "name": "CLA-2003:571", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "name": "NetBSD-SA2003-002", "tags": [ "vendor-advisory", "x_refsource_NETBSD", "x_transferred" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "name": "HPSBUX0302-246", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "name": "20030303 Remote Sendmail Header Processing Vulnerability", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "name": "IY40502", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "name": "20030304 GLSA: sendmail (200303-4)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2003:073", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "20030301-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "name": "IY40501", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "name": "20030303 Fwd: APPLE-SA-2003-03-03 sendmail", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "name": "RHSA-2003:227", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "name": "6991", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6991" }, { "name": "VU#398025", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/398025" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sendmail.org/8.12.8.html" }, { "name": "DSA-257", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-257" }, { "name": "20030304 [LSD] Technical analysis of the remote sendmail vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2222", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" }, { "name": "RHSA-2003:074", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "name": "CA-2003-07", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "name": "20030303 sendmail 8.12.8 available", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "name": "MDKSA-2003:028", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "name": "IY40500", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "name": "sendmail-header-processing-bo(10748)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10748.php" }, { "name": "CSSA-2003-SCO.6", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "name": "CSSA-2003-SCO.5", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "name": "CLA-2003:571", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "name": "NetBSD-SA2003-002", "tags": [ "vendor-advisory", "x_refsource_NETBSD" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "name": "HPSBUX0302-246", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "name": "20030303 Remote Sendmail Header Processing Vulnerability", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "name": "IY40502", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "name": "20030304 GLSA: sendmail (200303-4)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:073", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "20030301-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "name": "IY40501", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "name": "20030303 Fwd: APPLE-SA-2003-03-03 sendmail", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "name": "RHSA-2003:227", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "name": "6991", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6991" }, { "name": "VU#398025", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/398025" }, { "name": "http://www.sendmail.org/8.12.8.html", "refsource": "CONFIRM", "url": "http://www.sendmail.org/8.12.8.html" }, { "name": "DSA-257", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-257" }, { "name": "20030304 [LSD] Technical analysis of the remote sendmail vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2222", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" }, { "name": "RHSA-2003:074", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "name": "CA-2003-07", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "name": "20030303 sendmail 8.12.8 available", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "name": "MDKSA-2003:028", "refsource": "MANDRAKE", "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "name": "IY40500", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "name": "sendmail-header-processing-bo(10748)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10748.php" }, { "name": "CSSA-2003-SCO.6", "refsource": "CALDERA", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "name": "CSSA-2003-SCO.5", "refsource": "CALDERA", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "name": "CLA-2003:571", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "name": "NetBSD-SA2003-002", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "name": "HPSBUX0302-246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "name": "20030303 Remote Sendmail Header Processing Vulnerability", "refsource": "ISS", "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "name": "IY40502", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "name": "20030304 GLSA: sendmail (200303-4)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1337", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-12-03T00:00:00", "dateUpdated": "2024-08-08T03:19:28.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2002-1337\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-03-07T05:00:00.000\",\"lastModified\":\"2024-11-20T23:41:03.983\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo mediante ciertos campos de direcci\u00f3n formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la funci\u00f3n crackaddr del fichero headers.c.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"C6D3A2C0-B076-4351-8085-DA3A37117453\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.10.0\",\"versionEndExcluding\":\"8.11.6\",\"matchCriteriaId\":\"5AE239ED-94EE-40C7-9133-D1F4779A2E0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.12.0\",\"versionEndExcluding\":\"8.12.8\",\"matchCriteriaId\":\"64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5556D665-3792-4832-9EEE-D1122C9BF98E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FD0EB4-E744-4465-AFEE-A3C807C9C993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BFA923-7D80-4F01-AF9F-6F13209948AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDE44C49-172C-4899-8CC8-29AA99A7CD2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771931F7-9180-4EBD-8627-E1CF17D24647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB008E3-9A00-4D28-8826-A9FCC9F65314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD9BE2B-7255-4FC1-B452-E8370632B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C7B4A8-E8D0-425C-B979-17E85458B0C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F538D2B-1AE1-4766-830E-CF7999181128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A52CF-4C6E-44D3-90C4-D2F72A40EF58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F864AD7-53A2-4225-870F-062876CE45DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369207B4-96FA-4324-9445-98FAE8ECF5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08003947-A4F1-44AC-84C6-9F8D097EB759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2475113-CFE4-41C8-A86F-F2DA6548D224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B197B3-AA07-440F-A733-80B7CE07B3D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42761237-75A9-4E8C-8202-3CA3EB3D1ACC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FAFD2BC-330C-4357-B8C7-F451C6282869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2151D858-F6D4-472E-9CC7-A8EA26E27CC7\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cert.org/advisories/CA-2003-07.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.debian.org/security/2003/dsa-257\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/security_center/static/10748.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/398025\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-073.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-074.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-227.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/6991\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/8.12.8.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cert.org/advisories/CA-2003-07.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.debian.org/security/2003/dsa-257\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.iss.net/security_center/static/10748.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/398025\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-074.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-227.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/6991\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Exploit\",\"Patch\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/8.12.8.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}" } }
rhsa-2003_073
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages also fix a security bug if sendmail is configured to use smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A sucessful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. \n\nAll users are advised to update to these erratum packages. For Red Hat\nLinux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable\nto these issues. For all other distributions we have included a backported\npatch which corrects these vulnerabilities.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:073", "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_073.json" } ], "title": "Red Hat Security Advisory: : Updated sendmail packages fix critical security issues", "tracking": { "current_release_date": "2024-11-21T22:40:25+00:00", "generator": { "date": "2024-11-21T22:40:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:073", "initial_release_date": "2003-03-03T17:04:00+00:00", "revision_history": [ { "date": "2003-03-03T17:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
RHSA-2003:074
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\n[Updated March 18 2003]\nAdded packages for Red Hat Enterprise Linux ES and Red Hat Enterprise Linux WS.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Enterprise Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nAll users are advised to update to these erratum packages which contain\na backported patch to correct this vulnerability.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:074", "url": "https://access.redhat.com/errata/RHSA-2003:074" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_074.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:40:30+00:00", "generator": { "date": "2024-11-21T22:40:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:074", "initial_release_date": "2003-03-03T17:05:00+00:00", "revision_history": [ { "date": "2003-03-03T17:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:074" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
RHSA-2003:073
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages also fix a security bug if sendmail is configured to use smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A sucessful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. \n\nAll users are advised to update to these erratum packages. For Red Hat\nLinux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable\nto these issues. For all other distributions we have included a backported\npatch which corrects these vulnerabilities.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:073", "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_073.json" } ], "title": "Red Hat Security Advisory: : Updated sendmail packages fix critical security issues", "tracking": { "current_release_date": "2024-11-21T22:40:25+00:00", "generator": { "date": "2024-11-21T22:40:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:073", "initial_release_date": "2003-03-03T17:04:00+00:00", "revision_history": [ { "date": "2003-03-03T17:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003:227
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available for Red Hat Linux on IBM iSeries\nand pSeries systems to fix a vulnerability that allows local and possibly\nremote attackers to gain root privileges as well as a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages additionally fix a security bug if sendmail is configured to\nuse smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA).\n\nA vulnerability exists in unpatched Sendmail versions prior to and\nincluding 8.12.8. The address parser performs insufficient bounds checking\nin certain conditions due to a char to int conversion, making it possible\nfor an attacker to take control of the application. This issue is probably\nlocally exploitable and may also be remotely exploitable. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0161 to this issue.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by Sendmail, causes arbitrary code to be\nexecuted as root. A proof-of-concept exploit is reported to exist, but is\nnot believed to be publicly available.\n\nSince this vulnerability is message-based, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1337 to this issue.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A successful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1165 to this issue.\n\nAll users are advised to update to these erratum packages containing\nbackported patches which correct these vulnerabilities.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:227", "url": "https://access.redhat.com/errata/RHSA-2003:227" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_227.json" } ], "title": "Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:44:02+00:00", "generator": { "date": "2024-11-21T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:227", "initial_release_date": "2003-07-08T20:37:00+00:00", "revision_history": [ { "date": "2003-07-08T20:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-07-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2003-0161", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616990" } ], "notes": [ { "category": "description", "text": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0161" }, { "category": "external", "summary": "RHBZ#1616990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161" } ], "release_date": "2003-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003:074
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\n[Updated March 18 2003]\nAdded packages for Red Hat Enterprise Linux ES and Red Hat Enterprise Linux WS.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Enterprise Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nAll users are advised to update to these erratum packages which contain\na backported patch to correct this vulnerability.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:074", "url": "https://access.redhat.com/errata/RHSA-2003:074" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_074.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:40:30+00:00", "generator": { "date": "2024-11-21T22:40:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:074", "initial_release_date": "2003-03-03T17:05:00+00:00", "revision_history": [ { "date": "2003-03-03T17:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:074" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003:073
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages also fix a security bug if sendmail is configured to use smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A sucessful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. \n\nAll users are advised to update to these erratum packages. For Red Hat\nLinux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable\nto these issues. For all other distributions we have included a backported\npatch which corrects these vulnerabilities.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:073", "url": "https://access.redhat.com/errata/RHSA-2003:073" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_073.json" } ], "title": "Red Hat Security Advisory: : Updated sendmail packages fix critical security issues", "tracking": { "current_release_date": "2024-11-21T22:40:25+00:00", "generator": { "date": "2024-11-21T22:40:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:073", "initial_release_date": "2003-03-03T17:04:00+00:00", "revision_history": [ { "date": "2003-03-03T17:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } }, { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:04:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:073" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003_074
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\n[Updated March 18 2003]\nAdded packages for Red Hat Enterprise Linux ES and Red Hat Enterprise Linux WS.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Enterprise Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nAll users are advised to update to these erratum packages which contain\na backported patch to correct this vulnerability.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:074", "url": "https://access.redhat.com/errata/RHSA-2003:074" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_074.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:40:30+00:00", "generator": { "date": "2024-11-21T22:40:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:074", "initial_release_date": "2003-03-03T17:05:00+00:00", "revision_history": [ { "date": "2003-03-03T17:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:074" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
rhsa-2003_227
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available for Red Hat Linux on IBM iSeries\nand pSeries systems to fix a vulnerability that allows local and possibly\nremote attackers to gain root privileges as well as a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages additionally fix a security bug if sendmail is configured to\nuse smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA).\n\nA vulnerability exists in unpatched Sendmail versions prior to and\nincluding 8.12.8. The address parser performs insufficient bounds checking\nin certain conditions due to a char to int conversion, making it possible\nfor an attacker to take control of the application. This issue is probably\nlocally exploitable and may also be remotely exploitable. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0161 to this issue.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by Sendmail, causes arbitrary code to be\nexecuted as root. A proof-of-concept exploit is reported to exist, but is\nnot believed to be publicly available.\n\nSince this vulnerability is message-based, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1337 to this issue.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A successful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1165 to this issue.\n\nAll users are advised to update to these erratum packages containing\nbackported patches which correct these vulnerabilities.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:227", "url": "https://access.redhat.com/errata/RHSA-2003:227" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_227.json" } ], "title": "Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:44:02+00:00", "generator": { "date": "2024-11-21T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:227", "initial_release_date": "2003-07-08T20:37:00+00:00", "revision_history": [ { "date": "2003-07-08T20:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-07-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2003-0161", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616990" } ], "notes": [ { "category": "description", "text": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0161" }, { "category": "external", "summary": "RHBZ#1616990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161" } ], "release_date": "2003-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
RHSA-2003:227
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available for Red Hat Linux on IBM iSeries\nand pSeries systems to fix a vulnerability that allows local and possibly\nremote attackers to gain root privileges as well as a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\nThese packages additionally fix a security bug if sendmail is configured to\nuse smrsh.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA).\n\nA vulnerability exists in unpatched Sendmail versions prior to and\nincluding 8.12.8. The address parser performs insufficient bounds checking\nin certain conditions due to a char to int conversion, making it possible\nfor an attacker to take control of the application. This issue is probably\nlocally exploitable and may also be remotely exploitable. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0161 to this issue.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by Sendmail, causes arbitrary code to be\nexecuted as root. A proof-of-concept exploit is reported to exist, but is\nnot believed to be publicly available.\n\nSince this vulnerability is message-based, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1337 to this issue.\n\nIn addition, the restricted shell (SMRSH) in Sendmail allows attackers to\nbypass the intended restrictions of smrsh by inserting additional commands\nafter \"||\" sequences or \"/\" characters, which are not properly filtered or\nverified. A successful attack would allow an attacker who has a local\naccount on a system which has explicitly enabled smrsh to execute arbitrary\nbinaries as themselves by utilizing their .forward file. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2002-1165 to this issue.\n\nAll users are advised to update to these erratum packages containing\nbackported patches which correct these vulnerabilities.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:227", "url": "https://access.redhat.com/errata/RHSA-2003:227" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=103350914307274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_227.json" } ], "title": "Red Hat Security Advisory: : : : Updated sendmail packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:44:02+00:00", "generator": { "date": "2024-11-21T22:44:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:227", "initial_release_date": "2003-07-08T20:37:00+00:00", "revision_history": [ { "date": "2003-07-08T20:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-07-08T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1165", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616854" } ], "notes": [ { "category": "description", "text": "Sendmail Consortium\u0027s Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) \"||\" sequences or (2) \"/\" characters, which are not properly filtered or verified.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1165" }, { "category": "external", "summary": "RHBZ#1616854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1165", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1165" } ], "release_date": "2002-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" }, { "cve": "CVE-2003-0161", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616990" } ], "notes": [ { "category": "description", "text": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0161" }, { "category": "external", "summary": "RHBZ#1616990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0161" } ], "release_date": "2003-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-07-08T20:37:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:227" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
fkie_cve-2002-1337
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sendmail | sendmail | * | |
sendmail | sendmail | * | |
sendmail | sendmail | * | |
hp | alphaserver_sc | * | |
gentoo | linux | 1.4 | |
gentoo | linux | 1.4 | |
hp | hp-ux | 10.10 | |
hp | hp-ux | 10.20 | |
hp | hp-ux | 11.00 | |
hp | hp-ux | 11.0.4 | |
hp | hp-ux | 11.11 | |
hp | hp-ux | 11.22 | |
netbsd | netbsd | 1.5 | |
netbsd | netbsd | 1.5.1 | |
netbsd | netbsd | 1.5.2 | |
netbsd | netbsd | 1.5.3 | |
netbsd | netbsd | 1.6 | |
oracle | solaris | 2.6 | |
oracle | solaris | 7.0 | |
oracle | solaris | 8 | |
oracle | solaris | 9 | |
sun | sunos | - | |
sun | sunos | 5.7 | |
sun | sunos | 5.8 | |
windriver | bsdos | 4.2 | |
windriver | bsdos | 4.3.1 | |
windriver | bsdos | 5.0 | |
windriver | platform_sa | 1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3A2C0-B076-4351-8085-DA3A37117453", "versionEndExcluding": "8.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AE239ED-94EE-40C7-9133-D1F4779A2E0C", "versionEndExcluding": "8.11.6", "versionStartIncluding": "8.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6", "versionEndExcluding": "8.12.8", "versionStartIncluding": "8.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E", "vulnerable": true }, { "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993", "vulnerable": true }, { "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*", "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", "matchCriteriaId": "4F864AD7-53A2-4225-870F-062876CE45DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "18B197B3-AA07-440F-A733-80B7CE07B3D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "42761237-75A9-4E8C-8202-3CA3EB3D1ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FAFD2BC-330C-4357-B8C7-F451C6282869", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2151D858-F6D4-472E-9CC7-A8EA26E27CC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo mediante ciertos campos de direcci\u00f3n formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la funci\u00f3n crackaddr del fichero headers.c." } ], "id": "CVE-2002-1337", "lastModified": "2024-11-20T23:41:03.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-07T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2003/dsa-257" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.iss.net/security_center/static/10748.php" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/398025" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6991" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.sendmail.org/8.12.8.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2003/dsa-257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.iss.net/security_center/static/10748.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/398025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.sendmail.org/8.12.8.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2002-1337
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2002-1337", "description": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "id": "GSD-2002-1337", "references": [ "https://www.suse.com/security/cve/CVE-2002-1337.html", "https://www.debian.org/security/2003/dsa-257", "https://access.redhat.com/errata/RHSA-2003:227", "https://access.redhat.com/errata/RHSA-2003:074", "https://access.redhat.com/errata/RHSA-2003:073" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2002-1337" ], "details": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "id": "GSD-2002-1337", "modified": "2023-12-13T01:24:10.922055Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:073", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "name": "20030301-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "name": "IY40501", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "name": "20030303 Fwd: APPLE-SA-2003-03-03 sendmail", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "name": "RHSA-2003:227", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "name": "6991", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6991" }, { "name": "VU#398025", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/398025" }, { "name": "http://www.sendmail.org/8.12.8.html", "refsource": "CONFIRM", "url": "http://www.sendmail.org/8.12.8.html" }, { "name": "DSA-257", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-257" }, { "name": "20030304 [LSD] Technical analysis of the remote sendmail vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2222", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" }, { "name": "RHSA-2003:074", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "name": "CA-2003-07", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "name": "20030303 sendmail 8.12.8 available", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "name": "MDKSA-2003:028", "refsource": "MANDRAKE", "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "name": "IY40500", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "name": "sendmail-header-processing-bo(10748)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10748.php" }, { "name": "CSSA-2003-SCO.6", "refsource": "CALDERA", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "name": "CSSA-2003-SCO.5", "refsource": "CALDERA", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "name": "CLA-2003:571", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "name": "NetBSD-SA2003-002", "refsource": "NETBSD", "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "name": "HPSBUX0302-246", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "name": "20030303 Remote Sendmail Header Processing Vulnerability", "refsource": "ISS", "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "name": "IY40502", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "name": "20030304 GLSA: sendmail (200303-4)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6D3A2C0-B076-4351-8085-DA3A37117453", "versionEndExcluding": "8.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AE239ED-94EE-40C7-9133-D1F4779A2E0C", "versionEndExcluding": "8.11.6", "versionStartIncluding": "8.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6", "versionEndExcluding": "8.12.8", "versionStartIncluding": "8.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E", "vulnerable": true }, { "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993", "vulnerable": true }, { "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*", "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", "matchCriteriaId": "4F864AD7-53A2-4225-870F-062876CE45DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "18B197B3-AA07-440F-A733-80B7CE07B3D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "42761237-75A9-4E8C-8202-3CA3EB3D1ACC", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7FAFD2BC-330C-4357-B8C7-F451C6282869", "vulnerable": true }, { "criteria": "cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2151D858-F6D4-472E-9CC7-A8EA26E27CC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo mediante ciertos campos de direcci\u00f3n formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la funci\u00f3n crackaddr del fichero headers.c." } ], "id": "CVE-2002-1337", "lastModified": "2024-02-09T03:19:11.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-07T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.debian.org/security/2003/dsa-257" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.iss.net/security_center/static/10748.php" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/398025" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/6991" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.sendmail.org/8.12.8.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
var-200303-0122
Vulnerability from variot
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. sendmail A buffer overflow vulnerability was discovered in message processing. The vulnerability could allow a third party to gain administrative privileges remotely. This problem, sendmail is caused by receiving a message with maliciously constructed header information. For this reason, LAN is running on a host installed within sendmail Even other MTA (Mail Transfer Agent) You may be affected by the vulnerability if you receive a malicious message relayed from .A third party may be able to remotely obtain administrator privileges. Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component. Successful attackers may exploit this vulnerability to gain control of affected servers. Reportedly, this vulnerability may be locally exploitable if the sendmail binary is setuid/setgid. Sendmail 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to 8.12.8 or to apply patches to earlier versions of the 8.12.x tree. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. When an email header contains an address or address list (eg \"From\", \"To\", \"CC\"), Sendmail will attempt to check whether the provided address or address list is valid. Sendmail does this using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree. Sendmail will check this buffer and stop adding data to it if it is found to be full. Sendmail goes through several safety checks to ensure that characters are interpreted correctly. On most Unix or Linux systems, Sendmail runs as the root user. Because the attack code can be included in what appears to be a normal email message, it can easily penetrate many common packet filtering devices or firewalls without being detected. Successful exploitation of an unpatched sendmail system leaves no messages in the syslog. However, on patched systems, attempts to exploit this vulnerability leave the following log message: Dropped invalid comments from header address This vulnerability affects both the commercial and open source versions of Sendmail, and is also reported to have been tested in the lab environment has been successfully exploited
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200303-0122", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.6" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5.3" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5.2" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5.1" }, { "model": "netbsd", "scope": "eq", "trust": 1.3, "vendor": "netbsd", "version": "1.5" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 1.3, "vendor": "hp", "version": "10.10" }, { "model": "sendmail", "scope": "lt", "trust": 1.0, "vendor": "sendmail", "version": "8.9.3" }, { "model": "bsdos", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "4.2" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "11.00" }, { "model": "sendmail", "scope": "lt", "trust": 1.0, "vendor": "sendmail", "version": "8.11.6" }, { "model": "sendmail", "scope": "gte", "trust": 1.0, "vendor": "sendmail", "version": "8.10.0" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.8" }, { "model": "sendmail", "scope": "gte", "trust": 1.0, "vendor": "sendmail", "version": "8.12.0" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "2.6" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "7.0" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "5.7" }, { "model": "bsdos", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "4.3.1" }, { "model": "bsdos", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "5.0" }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "11.0.4" }, { "model": "alphaserver sc", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": "*" }, { "model": "sunos", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": null }, { "model": "platform sa", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": "1.0" }, { "model": "sendmail", "scope": "lt", "trust": 1.0, "vendor": "sendmail", "version": "8.12.8" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "8" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "9" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "1.4" }, { "model": "alphaserver sc", "scope": null, "trust": 0.9, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "bsd os", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "conectiva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sgi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sendmail", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "the sco group sco linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "the sco group sco unixware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "the sendmail consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "xerox", "version": null }, { "model": "bsd/os", "scope": null, "trust": 0.8, "vendor": "\u30d5\u30a9\u30a2 \u30c1\u30e5\u30fc\u30f3", "version": null }, { "model": "ux4800\u30b7\u30ea\u30fc\u30ba", "scope": null, "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null }, { "model": "sendmail", "scope": null, "trust": 0.8, "vendor": "sendmail consortium", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "sun cobalt qube3", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "systemwalker perfmgr", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "teamware office", "scope": "eq", "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "sun cobalt raq3", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "sendmail switch", "scope": null, "trust": 0.8, "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e", "version": null }, { "model": "up-ux", "scope": null, "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null }, { "model": "sun cobalt raq4", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "interstage collaborationring pm", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "irix", "scope": null, "trust": 0.8, "vendor": "sgi", "version": null }, { "model": "netbsd", "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": "sun linux 5.0", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "turbolinux workstation", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "unixware", "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": "interstage collaborationring tpm", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "sendmail pro", "scope": null, "trust": 0.8, "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e", "version": null }, { "model": "sendmail for nt", "scope": null, "trust": 0.8, "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e", "version": null }, { "model": "turbolinux advanced server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "systemwalker it budgetmgr", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "apple mac os x", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "aix", "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": "hi-ux/we2", "scope": null, "trust": 0.8, "vendor": "\u65e5\u7acb", "version": null }, { "model": "open unix", "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": "trendmicro interscan viruswall", "scope": null, "trust": 0.8, "vendor": "\u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed", "version": null }, { "model": "sun cobalt raq550", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "internet navigware server", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "openlinux", "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": "hp-ux", "scope": null, "trust": 0.8, "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9", "version": null }, { "model": "interstage office square", "scope": null, "trust": 0.8, "vendor": "\u5bcc\u58eb\u901a", "version": null }, { "model": "red hat enterprise linux", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "sun solaris", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "red hat linux advanced workstation", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "turbolinux server", "scope": null, "trust": 0.8, "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9", "version": null }, { "model": "sun cobalt raqxtr", "scope": null, "trust": 0.8, "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "red hat linux", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "ews-ux", "scope": null, "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null }, { "model": "freebsd", "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 0.6, "vendor": "hp", "version": "11.04" }, { "model": "river systems platform sa", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "1.0" }, { "model": "river systems bsd/os", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "5.0" }, { "model": "river systems bsd/os", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "4.3.1" }, { "model": "river systems bsd/os", "scope": "eq", "trust": 0.3, "vendor": "wind", "version": "4.2" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "7.0" }, { "model": "solaris 2.6 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "2.6" }, { "model": "lx50", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cobalt raq xtr", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cobalt raq", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "550" }, { "model": "cobalt raq", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4" }, { "model": "cobalt raq", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3" }, { "model": "cobalt qube", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "3" }, { "model": "cobalt manageraq3 3000r-mr", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cobalt cacheraq", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "4" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.18" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.17" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.16" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.15" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.14" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.13" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.12" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.11" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.10" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.9" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.8" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.7" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.6" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.5" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.4" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.3" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.2" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.1" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5" }, { "model": "freeware", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "1.0" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.2" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.1" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.4" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.3" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.2" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.1" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.4" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.3" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.2" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.1" }, { "model": "inc sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1" }, { "model": "inc sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.2" }, { "model": "inc sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.1" }, { "model": "inc sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0" }, { "model": "inc sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.6.1" }, { "model": "inc sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.6" }, { "model": "inc sendmail advanced message server", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "1.3" }, { "model": "inc sendmail advanced message server", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "1.2" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.2" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.1" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.4" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.3" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.2" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2.1" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.2" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.4" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.3" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.2" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1.1" }, { "model": "consortium sendmail switch", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.1" }, { "model": "consortium sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.2" }, { "model": "consortium sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0.1" }, { "model": "consortium sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "3.0" }, { "model": "consortium sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.6.1" }, { "model": "consortium sendmail for nt", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "2.6" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.7" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.6" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.5" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.4" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.3" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.2" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.1" }, { "model": "consortium sendmail beta7", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12" }, { "model": "consortium sendmail beta5", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12" }, { "model": "consortium sendmail beta16", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12" }, { "model": "consortium sendmail beta12", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12" }, { "model": "consortium sendmail beta10", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.12.0" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11.6" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11.5" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11.4" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11.3" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11.2" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11.1" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.11" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.10.2" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.10.1" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.10" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.9.3" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.9.2" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.9.1" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.9.0" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "8.8.8" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "5.65" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "5.61" }, { "model": "consortium sendmail", "scope": "eq", "trust": 0.3, "vendor": "sendmail", "version": "5.59" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.3" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.1" }, { "model": "open unix", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "8.0" }, { "model": "z/os v1r4", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "z/os v1r2", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "os/390 v2r8", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "os/390 v2r10", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mvs", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "mpe/ix", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.5" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "hp-ux b.11.22", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux rc2", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "1.4" }, { "model": "linux rc1", "scope": "eq", "trust": 0.3, "vendor": "gentoo", "version": "1.4" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "5.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.7" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "4.6" }, { "model": "irix", "scope": "ne", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "inc sendmail switch", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "3.0.3" }, { "model": "inc sendmail switch", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "2.2.5" }, { "model": "inc sendmail switch", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "2.1.5" }, { "model": "inc sendmail for nt", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "3.0.3" }, { "model": "inc sendmail for nt", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "2.6.2" }, { "model": "consortium sendmail switch", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "3.0.3" }, { "model": "consortium sendmail switch", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "2.2.5" }, { "model": "consortium sendmail switch", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "2.1.5" }, { "model": "consortium sendmail for nt", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "3.0.3" }, { "model": "consortium sendmail for nt", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "2.6.2" }, { "model": "consortium sendmail", "scope": "ne", "trust": 0.3, "vendor": "sendmail", "version": "8.12.8" }, { "model": "gnu/*/linux", "scope": "ne", "trust": 0.3, "vendor": "openwall", "version": "1.0" }, { "model": "networks junos", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "5.1" }, { "model": "networks junos", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "5.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#398025" }, { "db": "BID", "id": "6991" }, { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "CNNVD", "id": "CNNVD-200303-038" }, { "db": "NVD", "id": "CVE-2002-1337" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ISS X-Force\u203b xforce@iss.net", "sources": [ { "db": "CNNVD", "id": "CNNVD-200303-038" } ], "trust": 0.6 }, "cve": "CVE-2002-1337", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2002-1337", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-5722", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-1337", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#398025", "trust": 0.8, "value": "66.00" }, { "author": "NVD", "id": "CVE-2002-1337", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200303-038", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-5722", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#398025" }, { "db": "VULHUB", "id": "VHN-5722" }, { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "CNNVD", "id": "CNNVD-200303-038" }, { "db": "NVD", "id": "CVE-2002-1337" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. sendmail A buffer overflow vulnerability was discovered in message processing. The vulnerability could allow a third party to gain administrative privileges remotely. This problem, sendmail is caused by receiving a message with maliciously constructed header information. For this reason, LAN is running on a host installed within sendmail Even other MTA (Mail Transfer Agent) You may be affected by the vulnerability if you receive a malicious message relayed from .A third party may be able to remotely obtain administrator privileges. Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component. Successful attackers may exploit this vulnerability to gain control of affected servers. \nReportedly, this vulnerability may be locally exploitable if the sendmail binary is setuid/setgid. \nSendmail 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to 8.12.8 or to apply patches to earlier versions of the 8.12.x tree. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. When an email header contains an address or address list (eg \\\"From\\\", \\\"To\\\", \\\"CC\\\"), Sendmail will attempt to check whether the provided address or address list is valid. Sendmail does this using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree. Sendmail will check this buffer and stop adding data to it if it is found to be full. Sendmail goes through several safety checks to ensure that characters are interpreted correctly. On most Unix or Linux systems, Sendmail runs as the root user. Because the attack code can be included in what appears to be a normal email message, it can easily penetrate many common packet filtering devices or firewalls without being detected. Successful exploitation of an unpatched sendmail system leaves no messages in the syslog. However, on patched systems, attempts to exploit this vulnerability leave the following log message: Dropped invalid comments from header address This vulnerability affects both the commercial and open source versions of Sendmail, and is also reported to have been tested in the lab environment has been successfully exploited", "sources": [ { "db": "NVD", "id": "CVE-2002-1337" }, { "db": "CERT/CC", "id": "VU#398025" }, { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "BID", "id": "6991" }, { "db": "VULHUB", "id": "VHN-5722" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-5722", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-5722" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2002-1337", "trust": 3.6 }, { "db": "CERT/CC", "id": "VU#398025", "trust": 3.3 }, { "db": "BID", "id": "6991", "trust": 2.8 }, { "db": "XF", "id": "10748", "trust": 1.4 }, { "db": "XF", "id": "11653", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000061", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200303-038", "trust": 0.7 }, { "db": "CALDERA", "id": "CSSA-2003-SCO.5", "trust": 0.6 }, { "db": "CALDERA", "id": "CSSA-2003-SCO.6", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:074", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:073", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:227", "trust": 0.6 }, { "db": "HP", "id": "HPSBUX0302-246", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030303 FWD: APPLE-SA-2003-03-03 SENDMAIL", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030304 [LSD] TECHNICAL ANALYSIS OF THE REMOTE SENDMAIL VULNERABILITY", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030304 GLSA: SENDMAIL (200303-4)", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030303 SENDMAIL 8.12.8 AVAILABLE", "trust": 0.6 }, { "db": "CERT/CC", "id": "CA-2003-07", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:2222", "trust": 0.6 }, { "db": "AIXAPAR", "id": "IY40500", "trust": 0.6 }, { "db": "AIXAPAR", "id": "IY40502", "trust": 0.6 }, { "db": "AIXAPAR", "id": "IY40501", "trust": 0.6 }, { "db": "CONECTIVA", "id": "CLA-2003:571", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2003:028", "trust": 0.6 }, { "db": "SGI", "id": "20030301-01-P", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-257", "trust": 0.6 }, { "db": "ISS", "id": "20030303 REMOTE SENDMAIL HEADER PROCESSING VULNERABILITY", "trust": 0.6 }, { "db": "NETBSD", "id": "NETBSD-SA2003-002", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-76118", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-76119", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "22314", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "22313", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "411", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-5722", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#398025" }, { "db": "VULHUB", "id": "VHN-5722" }, { "db": "BID", "id": "6991" }, { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "CNNVD", "id": "CNNVD-200303-038" }, { "db": "NVD", "id": "CVE-2002-1337" } ] }, "id": "VAR-200303-0122", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-5722" } ], "trust": 0.421969685 }, "last_update_date": "2024-11-22T21:23:55.658000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HS03-001 Fujitsu CERT\u00a0Advisory information", "trust": 0.8, "url": "http://www.debian.org/security/2003/dsa-257" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000061" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "NVD", "id": "CVE-2002-1337" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.3, "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=21950" }, { "trust": 3.8, "url": "http://www.sendmail.org/8.12.8.html" }, { "trust": 3.8, "url": "http://www.cert.org/advisories/ca-2003-07.html" }, { "trust": 3.5, "url": "http://www.securityfocus.com/bid/6991" }, { "trust": 3.5, "url": "http://www.kb.cert.org/vuls/id/398025" }, { "trust": 2.7, "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40500\u0026apar=only" }, { "trust": 2.7, "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40501\u0026apar=only" }, { "trust": 2.7, "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40502\u0026apar=only" }, { "trust": 2.7, "url": "ftp://ftp.sco.com/pub/updates/unixware/cssa-2003-sco.5" }, { "trust": 2.7, "url": "ftp://ftp.sco.com/pub/updates/openserver/cssa-2003-sco.6" }, { "trust": 2.7, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "trust": 2.7, "url": "http://www.debian.org/security/2003/dsa-257" }, { "trust": 2.7, "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2003:028" }, { "trust": 2.7, "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2003-002.txt.asc" }, { "trust": 2.7, "url": "http://www.redhat.com/support/errata/rhsa-2003-073.html" }, { "trust": 2.7, "url": "http://www.redhat.com/support/errata/rhsa-2003-074.html" }, { "trust": 2.7, "url": "http://www.redhat.com/support/errata/rhsa-2003-227.html" }, { "trust": 2.7, "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-p" }, { "trust": 2.7, "url": "http://www.iss.net/security_center/static/10748.php" }, { "trust": 2.1, "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "trust": 2.1, "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "trust": 2.1, "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" }, { "trust": 2.1, "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "trust": 2.1, "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "trust": 2.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2222" }, { "trust": 1.1, "url": "http://www.sendmail.org" }, { "trust": 0.8, "url": "http://www.sendmail.com/security/" }, { "trust": 0.8, "url": "http://www.securityfocus.org/archive/1/313757/2003-03-01/2003-03-07/0" }, { "trust": 0.8, "url": "http://www.nipc.gov/warnings/advisories/2003/03-004.htm" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2003-07" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1337" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2003/at030002.txt" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2003/wr031001.txt" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20030314_190827.html" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/20030305_170302.html" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/20030303sendmail.html" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/n-048.shtml" }, { "trust": 0.8, "url": "http://www.isskk.co.jp/support/techinfo/general/sendmailheader_xforce.html" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/10748" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/11653" }, { "trust": 0.6, "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51ab21-c0103500-17099-es-20030226.readme" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678862409849\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2222" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0794.1" }, { "trust": 0.3, "url": "http://www.slackware.org/lists/archive/viewer.php?l=slackware-security\u0026y=2003\u0026m=slackware-security.286398" }, { "trust": 0.3, "url": "http://www.sendmail.org/" }, { "trust": 0.3, "url": "ftp://ftp1.support.compaq.com/public/unix/v4.0g/t64v40gb17-c0028100-16887-es-20030211.readme" }, { "trust": 0.3, "url": "ftp://ftp1.support.compaq.com/public/unix/v4.0f/duv40fb18-c0092200-16888-es-20030211.readme" }, { "trust": 0.3, "url": "http://ftp1.support.compaq.com/public/unix/v5.0a/t64v50ab17-c0031300-16884-es-20030211.readme" }, { "trust": 0.3, "url": "ftp://ftp1.support.compaq.com/public/unix/v5.1/t64v51b19-c0169100-16882-es-20030211.readme" }, { "trust": 0.3, "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51bb1-c0003900-16874-es-20030211.readme" }, { "trust": 0.3, "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51b20-c0169800-16980-es-20030218.readme" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/51181" }, { "trust": 0.3, "url": "http://www.sendmail.com" }, { "trust": 0.3, "url": "/archive/1/313757" }, { "trust": 0.3, "url": "/archive/1/313795" }, { "trust": 0.3, "url": "/archive/1/313841" }, { "trust": 0.1, "url": "" } ], "sources": [ { "db": "CERT/CC", "id": "VU#398025" }, { "db": "VULHUB", "id": "VHN-5722" }, { "db": "BID", "id": "6991" }, { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "CNNVD", "id": "CNNVD-200303-038" }, { "db": "NVD", "id": "CVE-2002-1337" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#398025" }, { "db": "VULHUB", "id": "VHN-5722" }, { "db": "BID", "id": "6991" }, { "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "db": "CNNVD", "id": "CNNVD-200303-038" }, { "db": "NVD", "id": "CVE-2002-1337" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-03-03T00:00:00", "db": "CERT/CC", "id": "VU#398025" }, { "date": "2003-03-07T00:00:00", "db": "VULHUB", "id": "VHN-5722" }, { "date": "2003-03-02T00:00:00", "db": "BID", "id": "6991" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "date": "2003-03-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200303-038" }, { "date": "2003-03-07T05:00:00", "db": "NVD", "id": "CVE-2002-1337" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-09-15T00:00:00", "db": "CERT/CC", "id": "VU#398025" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-5722" }, { "date": "2007-09-22T00:30:00", "db": "BID", "id": "6991" }, { "date": "2024-03-01T01:52:00", "db": "JVNDB", "id": "JVNDB-2003-000061" }, { "date": "2006-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200303-038" }, { "date": "2024-11-20T23:41:03.983000", "db": "NVD", "id": "CVE-2002-1337" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200303-038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Remote Buffer Overflow in Sendmail", "sources": [ { "db": "CERT/CC", "id": "VU#398025" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "6991" }, { "db": "CNNVD", "id": "CNNVD-200303-038" } ], "trust": 0.9 } }
ghsa-2vpw-h4q9-62fp
Vulnerability from github
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
{ "affected": [], "aliases": [ "CVE-2002-1337" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2003-03-07T05:00:00Z", "severity": "HIGH" }, "details": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "id": "GHSA-2vpw-h4q9-62fp", "modified": "2022-05-03T03:08:07Z", "published": "2022-05-03T03:08:07Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571" }, { "type": "WEB", "url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2" }, { "type": "WEB", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40500\u0026apar=only" }, { "type": "WEB", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40501\u0026apar=only" }, { "type": "WEB", "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY40502\u0026apar=only" }, { "type": "WEB", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-257" }, { "type": "WEB", "url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" }, { "type": "WEB", "url": "http://www.iss.net/security_center/static/10748.php" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/398025" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-073.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-074.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-227.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/6991" }, { "type": "WEB", "url": "http://www.sendmail.org/8.12.8.html" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.